1 /*
2 * Wi-Fi Direct - P2P Invitation procedure
3 * Copyright (c) 2010, Atheros Communications
4 *
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
7 */
8
9 #include "includes.h"
10
11 #include "common.h"
12 #include "common/ieee802_11_defs.h"
13 #include "common/wpa_ctrl.h"
14 #include "common/sae.h"
15 #include "crypto/sha384.h"
16 #include "common/wpa_common.h"
17 #include "pasn/pasn_common.h"
18 #include "p2p_i.h"
19 #include "p2p.h"
20
21
p2p_build_invitation_req(struct p2p_data * p2p,struct p2p_device * peer,const u8 * go_dev_addr,int dev_pw_id)22 struct wpabuf * p2p_build_invitation_req(struct p2p_data *p2p,
23 struct p2p_device *peer,
24 const u8 *go_dev_addr, int dev_pw_id)
25 {
26 struct wpabuf *buf;
27 u8 *len;
28 const u8 *dev_addr;
29 size_t extra = 0;
30 bool is_6ghz_capab;
31
32 #ifdef CONFIG_WIFI_DISPLAY
33 struct wpabuf *wfd_ie = p2p->wfd_ie_invitation;
34 if (wfd_ie && p2p->inv_role == P2P_INVITE_ROLE_ACTIVE_GO) {
35 size_t i;
36 for (i = 0; i < p2p->num_groups; i++) {
37 struct p2p_group *g = p2p->groups[i];
38 struct wpabuf *ie;
39 if (!ether_addr_equal(p2p_group_get_interface_addr(g),
40 p2p->inv_bssid))
41 continue;
42 ie = p2p_group_get_wfd_ie(g);
43 if (ie) {
44 wfd_ie = ie;
45 break;
46 }
47 }
48 }
49 if (wfd_ie)
50 extra = wpabuf_len(wfd_ie);
51 #endif /* CONFIG_WIFI_DISPLAY */
52
53 if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_INV_REQ])
54 extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_P2P_INV_REQ]);
55
56 buf = wpabuf_alloc(1000 + extra);
57 if (buf == NULL)
58 return NULL;
59
60 peer->dialog_token++;
61 if (peer->dialog_token == 0)
62 peer->dialog_token = 1;
63 p2p_buf_add_public_action_hdr(buf, P2P_INVITATION_REQ,
64 peer->dialog_token);
65
66 len = p2p_buf_add_ie_hdr(buf);
67 if (p2p->inv_role == P2P_INVITE_ROLE_ACTIVE_GO || !p2p->inv_persistent)
68 p2p_buf_add_config_timeout(buf, 0, 0);
69 else
70 p2p_buf_add_config_timeout(buf, p2p->go_timeout,
71 p2p->client_timeout);
72 p2p_buf_add_invitation_flags(buf, p2p->inv_persistent ?
73 P2P_INVITATION_FLAGS_TYPE : 0);
74 if (p2p->inv_role != P2P_INVITE_ROLE_CLIENT ||
75 !(peer->flags & P2P_DEV_NO_PREF_CHAN))
76 p2p_buf_add_operating_channel(buf, p2p->cfg->country,
77 p2p->op_reg_class,
78 p2p->op_channel);
79 if (p2p->inv_bssid_set)
80 p2p_buf_add_group_bssid(buf, p2p->inv_bssid);
81 is_6ghz_capab = is_p2p_6ghz_capable(p2p) &&
82 p2p_is_peer_6ghz_capab(p2p, peer->info.p2p_device_addr);
83 p2p_buf_add_channel_list(buf, p2p->cfg->country, &p2p->channels,
84 is_6ghz_capab);
85 if (go_dev_addr)
86 dev_addr = go_dev_addr;
87 else if (p2p->inv_role == P2P_INVITE_ROLE_CLIENT)
88 dev_addr = peer->info.p2p_device_addr;
89 else
90 dev_addr = p2p->cfg->dev_addr;
91 p2p_buf_add_group_id(buf, dev_addr, p2p->inv_ssid, p2p->inv_ssid_len);
92 p2p_buf_add_device_info(buf, p2p, peer);
93 p2p_buf_update_ie_hdr(buf, len);
94
95 p2p_buf_add_pref_channel_list(buf, p2p->pref_freq_list,
96 p2p->num_pref_freq);
97
98 #ifdef CONFIG_WIFI_DISPLAY
99 if (wfd_ie)
100 wpabuf_put_buf(buf, wfd_ie);
101 #endif /* CONFIG_WIFI_DISPLAY */
102
103 if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_INV_REQ])
104 wpabuf_put_buf(buf, p2p->vendor_elem[VENDOR_ELEM_P2P_INV_REQ]);
105
106 if (dev_pw_id >= 0 && !peer->p2p2) {
107 /* WSC IE in Invitation Request for NFC static handover */
108 p2p_build_wps_ie(p2p, buf, dev_pw_id, 0);
109 }
110
111 return buf;
112 }
113
114
p2p_build_invitation_resp(struct p2p_data * p2p,struct p2p_device * peer,u8 dialog_token,u8 status,const u8 * group_bssid,u8 reg_class,u8 channel,struct p2p_channels * channels,const u8 * ssid,size_t ssid_len)115 static struct wpabuf * p2p_build_invitation_resp(struct p2p_data *p2p,
116 struct p2p_device *peer,
117 u8 dialog_token, u8 status,
118 const u8 *group_bssid,
119 u8 reg_class, u8 channel,
120 struct p2p_channels *channels,
121 const u8 *ssid,
122 size_t ssid_len)
123 {
124 struct wpabuf *buf;
125 u8 *len;
126 size_t extra = 0;
127
128 #ifdef CONFIG_WIFI_DISPLAY
129 struct wpabuf *wfd_ie = p2p->wfd_ie_invitation;
130 if (wfd_ie && group_bssid) {
131 size_t i;
132 for (i = 0; i < p2p->num_groups; i++) {
133 struct p2p_group *g = p2p->groups[i];
134 struct wpabuf *ie;
135 if (!ether_addr_equal(p2p_group_get_interface_addr(g),
136 group_bssid))
137 continue;
138 ie = p2p_group_get_wfd_ie(g);
139 if (ie) {
140 wfd_ie = ie;
141 break;
142 }
143 }
144 }
145 if (wfd_ie)
146 extra = wpabuf_len(wfd_ie);
147 #endif /* CONFIG_WIFI_DISPLAY */
148
149 if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_INV_RESP])
150 extra += wpabuf_len(p2p->vendor_elem[VENDOR_ELEM_P2P_INV_RESP]);
151
152 buf = wpabuf_alloc(1000 + extra);
153 if (buf == NULL)
154 return NULL;
155
156 p2p_buf_add_public_action_hdr(buf, P2P_INVITATION_RESP,
157 dialog_token);
158
159 len = p2p_buf_add_ie_hdr(buf);
160 p2p_buf_add_status(buf, status);
161 p2p_buf_add_config_timeout(buf, 0, 0); /* FIX */
162 if (reg_class && channel)
163 p2p_buf_add_operating_channel(buf, p2p->cfg->country,
164 reg_class, channel);
165 if (group_bssid)
166 p2p_buf_add_group_bssid(buf, group_bssid);
167
168 if (ssid_len && ssid) {
169 const u8 *dev_addr;
170
171 if (p2p->inv_role == P2P_INVITE_ROLE_CLIENT)
172 dev_addr = peer->info.p2p_device_addr;
173 else
174 dev_addr = p2p->cfg->dev_addr;
175
176 p2p_buf_add_group_id(buf, dev_addr, ssid, ssid_len);
177 }
178
179 if (channels) {
180 bool is_6ghz_capab;
181
182 is_6ghz_capab = is_p2p_6ghz_capable(p2p) &&
183 p2p_is_peer_6ghz_capab(p2p, peer->info.p2p_device_addr);
184 p2p_buf_add_channel_list(buf, p2p->cfg->country, channels,
185 is_6ghz_capab);
186 }
187 p2p_buf_update_ie_hdr(buf, len);
188
189 #ifdef CONFIG_WIFI_DISPLAY
190 if (wfd_ie)
191 wpabuf_put_buf(buf, wfd_ie);
192 #endif /* CONFIG_WIFI_DISPLAY */
193
194 if (p2p->vendor_elem && p2p->vendor_elem[VENDOR_ELEM_P2P_INV_RESP])
195 wpabuf_put_buf(buf, p2p->vendor_elem[VENDOR_ELEM_P2P_INV_RESP]);
196
197 return buf;
198 }
199
200
p2p_process_invitation_req(struct p2p_data * p2p,const u8 * sa,const u8 * data,size_t len,int rx_freq,bool p2p2)201 struct wpabuf * p2p_process_invitation_req(struct p2p_data *p2p, const u8 *sa,
202 const u8 *data, size_t len,
203 int rx_freq, bool p2p2)
204 {
205 struct p2p_device *dev;
206 struct p2p_message msg;
207 struct wpabuf *resp = NULL;
208 u8 status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE;
209 int go = 0;
210 u8 group_bssid[ETH_ALEN], *bssid;
211 int op_freq = 0;
212 u8 reg_class = 0, channel = 0;
213 const u8 *new_ssid = NULL;
214 size_t new_ssid_len = 0;
215 struct p2p_channels all_channels, intersection, *channels = NULL;
216 int persistent;
217
218 os_memset(group_bssid, 0, sizeof(group_bssid));
219
220 p2p_dbg(p2p, "Received Invitation Request from " MACSTR " (freq=%d)",
221 MAC2STR(sa), rx_freq);
222
223 if (p2p_parse(data, len, &msg))
224 return NULL;
225
226 dev = p2p_get_device(p2p, sa);
227 if (dev == NULL || (dev->flags & P2P_DEV_PROBE_REQ_ONLY)) {
228 p2p_dbg(p2p, "Invitation Request from unknown peer " MACSTR,
229 MAC2STR(sa));
230
231 if (p2p_add_device(p2p, sa, rx_freq, NULL, 0, data + 1, len - 1,
232 0)) {
233 p2p_dbg(p2p, "Invitation Request add device failed "
234 MACSTR, MAC2STR(sa));
235 status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE;
236 goto fail;
237 }
238
239 dev = p2p_get_device(p2p, sa);
240 if (dev == NULL) {
241 p2p_dbg(p2p, "Reject Invitation Request from unknown peer "
242 MACSTR, MAC2STR(sa));
243 status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE;
244 goto fail;
245 }
246 }
247
248 if (!msg.group_id || !msg.channel_list) {
249 p2p_dbg(p2p, "Mandatory attribute missing in Invitation Request from "
250 MACSTR, MAC2STR(sa));
251 status = P2P_SC_FAIL_INVALID_PARAMS;
252 goto fail;
253 }
254
255 if (msg.invitation_flags)
256 persistent = *msg.invitation_flags & P2P_INVITATION_FLAGS_TYPE;
257 else {
258 /* Invitation Flags is a mandatory attribute starting from P2P
259 * spec 1.06. As a backwards compatibility mechanism, assume
260 * the request was for a persistent group if the attribute is
261 * missing.
262 */
263 p2p_dbg(p2p, "Mandatory Invitation Flags attribute missing from Invitation Request");
264 persistent = 1;
265 }
266
267 p2p_channels_union(&p2p->cfg->channels, &p2p->cfg->cli_channels,
268 &all_channels);
269
270 if (p2p_peer_channels_check(p2p, &all_channels, dev,
271 msg.channel_list, msg.channel_list_len) <
272 0) {
273 p2p_dbg(p2p, "No common channels found");
274 status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
275 goto fail;
276 }
277
278 p2p_channels_dump(p2p, "own channels", &p2p->cfg->channels);
279 p2p_channels_dump(p2p, "own client channels", &all_channels);
280 p2p_channels_dump(p2p, "peer channels", &dev->channels);
281 p2p_channels_intersect(&all_channels, &dev->channels,
282 &intersection);
283 p2p_channels_dump(p2p, "intersection", &intersection);
284
285 if (p2p->cfg->invitation_process) {
286 status = p2p->cfg->invitation_process(
287 p2p->cfg->cb_ctx, sa, msg.group_bssid, msg.group_id,
288 msg.group_id + ETH_ALEN, msg.group_id_len - ETH_ALEN,
289 &go, group_bssid, &op_freq, persistent, &intersection,
290 msg.dev_password_id_present ? msg.dev_password_id : -1,
291 p2p2, &new_ssid, &new_ssid_len);
292 }
293
294 if (go) {
295 p2p_channels_intersect(&p2p->cfg->channels, &dev->channels,
296 &intersection);
297 p2p_channels_dump(p2p, "intersection(GO)", &intersection);
298 if (intersection.reg_classes == 0) {
299 p2p_dbg(p2p, "No common channels found (GO)");
300 status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
301 goto fail;
302 }
303 }
304
305 if (op_freq) {
306 p2p_dbg(p2p, "Invitation processing forced frequency %d MHz",
307 op_freq);
308 if (p2p_freq_to_channel(op_freq, ®_class, &channel) < 0) {
309 p2p_dbg(p2p, "Unknown forced freq %d MHz from invitation_process()",
310 op_freq);
311 status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
312 goto fail;
313 }
314
315 if (!p2p_channels_includes(&intersection, reg_class, channel))
316 {
317 p2p_dbg(p2p, "forced freq %d MHz not in the supported channels intersection",
318 op_freq);
319 status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
320 goto fail;
321 }
322
323 if (status == P2P_SC_SUCCESS)
324 channels = &intersection;
325 } else {
326 p2p_dbg(p2p, "No forced channel from invitation processing - figure out best one to use");
327
328 /* Default to own configuration as a starting point */
329 p2p->op_reg_class = p2p->cfg->op_reg_class;
330 p2p->op_channel = p2p->cfg->op_channel;
331 p2p_dbg(p2p, "Own default op_class %d channel %d",
332 p2p->op_reg_class, p2p->op_channel);
333
334 #ifdef CONFIG_TESTING_OPTIONS
335 if (p2p->cfg->inv_op_class) {
336 /* Override configuration as a starting point */
337 p2p->op_reg_class = p2p->cfg->inv_op_class;
338 p2p->op_channel = p2p->cfg->inv_op_channel;
339 p2p_dbg(p2p,
340 "Override Invitation op_class %d channel %d",
341 p2p->op_reg_class, p2p->op_channel);
342 }
343 #endif /* CONFIG_TESTING_OPTIONS */
344
345 /* Use peer preference if specified and compatible */
346 if (msg.operating_channel) {
347 int req_freq;
348 req_freq = p2p_channel_to_freq(
349 msg.operating_channel[3],
350 msg.operating_channel[4]);
351 p2p_dbg(p2p, "Peer operating channel preference: %d MHz",
352 req_freq);
353 if (req_freq > 0 &&
354 p2p_channels_includes(&intersection,
355 msg.operating_channel[3],
356 msg.operating_channel[4])) {
357 p2p->op_reg_class = msg.operating_channel[3];
358 p2p->op_channel = msg.operating_channel[4];
359 p2p_dbg(p2p, "Use peer preference op_class %d channel %d",
360 p2p->op_reg_class, p2p->op_channel);
361 } else {
362 p2p_dbg(p2p, "Cannot use peer channel preference");
363 }
364 }
365
366 /* Reselect the channel only for the case of the GO */
367 if (go &&
368 !p2p_channels_includes(&intersection, p2p->op_reg_class,
369 p2p->op_channel)) {
370 p2p_dbg(p2p, "Initially selected channel (op_class %d channel %d) not in channel intersection - try to reselect",
371 p2p->op_reg_class, p2p->op_channel);
372 p2p_reselect_channel(p2p, &intersection);
373 p2p_dbg(p2p, "Re-selection result: op_class %d channel %d",
374 p2p->op_reg_class, p2p->op_channel);
375 if (!p2p_channels_includes(&intersection,
376 p2p->op_reg_class,
377 p2p->op_channel)) {
378 p2p_dbg(p2p, "Peer does not support selected operating channel (reg_class=%u channel=%u)",
379 p2p->op_reg_class, p2p->op_channel);
380 status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
381 goto fail;
382 }
383 } else if (go && !(dev->flags & P2P_DEV_FORCE_FREQ) &&
384 !p2p->cfg->cfg_op_channel) {
385 p2p_dbg(p2p, "Try to reselect channel selection with peer information received; previously selected op_class %u channel %u",
386 p2p->op_reg_class, p2p->op_channel);
387 p2p_reselect_channel(p2p, &intersection);
388 }
389
390 /*
391 * Use the driver preferred frequency list extension if
392 * supported.
393 */
394 p2p_check_pref_chan(p2p, go, dev, &msg);
395
396 op_freq = p2p_channel_to_freq(p2p->op_reg_class,
397 p2p->op_channel);
398 if (op_freq < 0) {
399 p2p_dbg(p2p, "Unknown operational channel (country=%c%c reg_class=%u channel=%u)",
400 p2p->cfg->country[0], p2p->cfg->country[1],
401 p2p->op_reg_class, p2p->op_channel);
402 status = P2P_SC_FAIL_NO_COMMON_CHANNELS;
403 goto fail;
404 }
405 p2p_dbg(p2p, "Selected operating channel - %d MHz", op_freq);
406
407 if (status == P2P_SC_SUCCESS) {
408 reg_class = p2p->op_reg_class;
409 channel = p2p->op_channel;
410 channels = &intersection;
411 }
412 }
413
414 fail:
415 if (go && status == P2P_SC_SUCCESS && !is_zero_ether_addr(group_bssid))
416 bssid = group_bssid;
417 else
418 bssid = NULL;
419 resp = p2p_build_invitation_resp(p2p, dev, msg.dialog_token, status,
420 bssid, reg_class, channel, channels,
421 new_ssid, new_ssid_len);
422
423 /*
424 * Store copy of invitation data to be used when processing TX status
425 * callback for the Acton frame.
426 */
427 os_memcpy(p2p->inv_sa, sa, ETH_ALEN);
428 if (msg.group_bssid) {
429 os_memcpy(p2p->inv_group_bssid, msg.group_bssid, ETH_ALEN);
430 p2p->inv_group_bssid_ptr = p2p->inv_group_bssid;
431 } else
432 p2p->inv_group_bssid_ptr = NULL;
433
434 if (p2p2 && new_ssid_len) {
435 os_memcpy(p2p->inv_ssid, new_ssid, new_ssid_len);
436 p2p->inv_ssid_len = new_ssid_len;
437 os_memcpy(p2p->inv_go_dev_addr, p2p->cfg->dev_addr, ETH_ALEN);
438 } else if (msg.group_id) {
439 if (msg.group_id_len - ETH_ALEN <= SSID_MAX_LEN) {
440 os_memcpy(p2p->inv_ssid, msg.group_id + ETH_ALEN,
441 msg.group_id_len - ETH_ALEN);
442 p2p->inv_ssid_len = msg.group_id_len - ETH_ALEN;
443 }
444 os_memcpy(p2p->inv_go_dev_addr, msg.group_id, ETH_ALEN);
445 } else {
446 p2p->inv_ssid_len = 0;
447 os_memset(p2p->inv_go_dev_addr, 0, ETH_ALEN);
448 }
449 p2p->inv_status = status;
450 p2p->inv_op_freq = op_freq;
451 p2p_parse_free(&msg);
452 return resp;
453 }
454
455
p2p_handle_invitation_req(struct p2p_data * p2p,const u8 * sa,const u8 * data,size_t len,int rx_freq)456 void p2p_handle_invitation_req(struct p2p_data *p2p, const u8 *sa,
457 const u8 *data, size_t len, int rx_freq)
458 {
459 int freq;
460 struct wpabuf *resp;
461
462 resp = p2p_process_invitation_req(p2p, sa, data, len, rx_freq, false);
463 if (!resp)
464 return;
465
466 if (rx_freq > 0)
467 freq = rx_freq;
468 else
469 freq = p2p_channel_to_freq(p2p->cfg->reg_class,
470 p2p->cfg->channel);
471 if (freq < 0)
472 p2p_dbg(p2p, "Unknown regulatory class/channel");
473
474 p2p->pending_action_state = P2P_PENDING_INVITATION_RESPONSE;
475 if (p2p_send_action(p2p, freq, sa, p2p->cfg->dev_addr,
476 p2p->cfg->dev_addr,
477 wpabuf_head(resp), wpabuf_len(resp), 50) < 0) {
478 p2p_dbg(p2p, "Failed to send Action frame");
479 }
480
481 wpabuf_free(resp);
482 }
483
484
p2p_process_invitation_resp(struct p2p_data * p2p,const u8 * sa,const u8 * data,size_t len)485 void p2p_process_invitation_resp(struct p2p_data *p2p, const u8 *sa,
486 const u8 *data, size_t len)
487 {
488 struct p2p_device *dev;
489 struct p2p_message msg;
490 struct p2p_channels intersection, *channels = NULL;
491 bool all_channels = false;
492 const u8 *go_dev_addr = NULL;
493
494 p2p_dbg(p2p, "Received Invitation Response from " MACSTR,
495 MAC2STR(sa));
496
497 dev = p2p_get_device(p2p, sa);
498 if (dev == NULL) {
499 p2p_dbg(p2p, "Ignore Invitation Response from unknown peer "
500 MACSTR, MAC2STR(sa));
501 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
502 return;
503 }
504
505 if (dev != p2p->invite_peer) {
506 p2p_dbg(p2p, "Ignore unexpected Invitation Response from peer "
507 MACSTR, MAC2STR(sa));
508 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
509 return;
510 }
511
512 if (p2p_parse(data, len, &msg)) {
513 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
514 return;
515 }
516
517 if (!msg.status) {
518 p2p_dbg(p2p, "Mandatory Status attribute missing in Invitation Response from "
519 MACSTR, MAC2STR(sa));
520 p2p_parse_free(&msg);
521 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
522 return;
523 }
524
525 /*
526 * We should not really receive a replayed response twice since
527 * duplicate frames are supposed to be dropped. However, not all drivers
528 * do that for pre-association frames. We did not use to verify dialog
529 * token matches for invitation response frames, but that check can be
530 * safely used to drop a replayed response to the previous Invitation
531 * Request in case the suggested operating channel was changed. This
532 * allows a duplicated reject frame to be dropped with the assumption
533 * that the real response follows after it.
534 */
535 if (*msg.status == P2P_SC_FAIL_NO_COMMON_CHANNELS &&
536 p2p->retry_invite_req_sent &&
537 msg.dialog_token != dev->dialog_token) {
538 p2p_dbg(p2p, "Unexpected Dialog Token %u (expected %u)",
539 msg.dialog_token, dev->dialog_token);
540 p2p_parse_free(&msg);
541 return;
542 }
543
544 if (*msg.status == P2P_SC_FAIL_NO_COMMON_CHANNELS &&
545 p2p->retry_invite_req &&
546 p2p_channel_random_social(&p2p->cfg->channels, &p2p->op_reg_class,
547 &p2p->op_channel, NULL, NULL) == 0) {
548 p2p->retry_invite_req = 0;
549 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
550 p2p->cfg->stop_listen(p2p->cfg->cb_ctx);
551 p2p_set_state(p2p, P2P_INVITE);
552 p2p_dbg(p2p, "Resend Invitation Request setting op_class %u channel %u as operating channel",
553 p2p->op_reg_class, p2p->op_channel);
554 p2p->retry_invite_req_sent = 1;
555 p2p_invite_send(p2p, p2p->invite_peer, p2p->invite_go_dev_addr,
556 p2p->invite_dev_pw_id);
557 p2p_parse_free(&msg);
558 return;
559 }
560 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
561 p2p->retry_invite_req = 0;
562
563 if (!msg.channel_list && *msg.status == P2P_SC_SUCCESS) {
564 p2p_dbg(p2p, "Mandatory Channel List attribute missing in Invitation Response from "
565 MACSTR, MAC2STR(sa));
566 #ifdef CONFIG_P2P_STRICT
567 p2p_parse_free(&msg);
568 return;
569 #endif /* CONFIG_P2P_STRICT */
570 /* Try to survive without peer channel list */
571 channels = &p2p->channels;
572 all_channels = true;
573 } else if (!msg.channel_list) {
574 /* Non-success cases are not required to include Channel List */
575 channels = &p2p->channels;
576 all_channels = true;
577 } else if (p2p_peer_channels_check(p2p, &p2p->channels, dev,
578 msg.channel_list,
579 msg.channel_list_len) < 0) {
580 p2p_dbg(p2p, "No common channels found");
581 p2p_parse_free(&msg);
582 dev->inv_reject = true;
583 return;
584 } else {
585 p2p_channels_intersect(&p2p->channels, &dev->channels,
586 &intersection);
587 channels = &intersection;
588 }
589
590 if (p2p->cfg->invitation_result) {
591 int peer_oper_freq = 0;
592 int freq = p2p_channel_to_freq(p2p->op_reg_class,
593 p2p->op_channel);
594 if (freq < 0)
595 freq = 0;
596
597 if (msg.operating_channel) {
598 peer_oper_freq = p2p_channel_to_freq(
599 msg.operating_channel[3],
600 msg.operating_channel[4]);
601 if (peer_oper_freq < 0)
602 peer_oper_freq = 0;
603 }
604
605 /*
606 * Use the driver preferred frequency list extension if
607 * supported.
608 */
609 p2p_check_pref_chan(p2p, 0, dev, &msg);
610
611 if (dev->p2p2) {
612 dev->inv_freq = freq;
613 dev->inv_status = *msg.status;
614 dev->inv_all_channels = all_channels;
615 dev->inv_peer_oper_freq = peer_oper_freq;
616 if (msg.group_bssid)
617 os_memcpy(dev->inv_bssid, msg.group_bssid,
618 ETH_ALEN);
619 if (msg.group_id) {
620 dev->inv_ssid_len = msg.group_id_len - ETH_ALEN;
621 os_memcpy(dev->inv_ssid,
622 msg.group_id + ETH_ALEN,
623 dev->inv_ssid_len);
624
625 os_memcpy(p2p->invite_go_dev_addr_buf,
626 msg.group_id, ETH_ALEN);
627 p2p->invite_go_dev_addr =
628 p2p->invite_go_dev_addr_buf;
629 go_dev_addr = p2p->invite_go_dev_addr;
630 }
631 goto out;
632 }
633
634 p2p->cfg->invitation_result(p2p->cfg->cb_ctx, *msg.status,
635 NULL, 0,
636 msg.group_bssid, channels, sa,
637 freq, peer_oper_freq, NULL, NULL,
638 0, go_dev_addr);
639 }
640
641 p2p_clear_timeout(p2p);
642 p2p_set_state(p2p, P2P_IDLE);
643 p2p->invite_peer = NULL;
644
645 out:
646 p2p_parse_free(&msg);
647 }
648
649
650 #ifdef CONFIG_PASN
p2p_start_invitation_connect(struct p2p_data * p2p,struct p2p_device * dev)651 void p2p_start_invitation_connect(struct p2p_data *p2p, struct p2p_device *dev)
652 {
653 size_t pmk_len = 0;
654 u8 pmkid[PMKID_LEN];
655 u8 pmk[PMK_LEN_MAX];
656 struct p2p_channels intersection;
657 const struct p2p_channels *inv_channels;
658
659 if (!p2p || !dev || dev->inv_reject || !dev->pasn)
660 return;
661
662 if (dev->inv_all_channels) {
663 inv_channels = &p2p->channels;
664 } else {
665 p2p_channels_intersect(&p2p->channels, &dev->channels,
666 &intersection);
667 inv_channels = &intersection;
668 }
669
670 pasn_initiator_pmksa_cache_get(dev->pasn->pmksa, dev->pasn->peer_addr,
671 pmkid, pmk, &pmk_len);
672
673 wpa_pasn_reset(dev->pasn);
674 p2p_dbg(p2p, "Invitation connect: msg status %d", dev->inv_status);
675 if (p2p->cfg->invitation_result)
676 p2p->cfg->invitation_result(p2p->cfg->cb_ctx, dev->inv_status,
677 dev->inv_ssid, dev->inv_ssid_len,
678 dev->inv_bssid, inv_channels,
679 dev->info.p2p_device_addr,
680 dev->inv_freq,
681 dev->inv_peer_oper_freq, pmkid,
682 pmk, pmk_len,
683 p2p->invite_go_dev_addr);
684
685 /* Reset PMK and PMKID from stack */
686 forced_memzero(pmkid, sizeof(pmkid));
687 forced_memzero(pmk, sizeof(pmk));
688
689 p2p_clear_timeout(p2p);
690 p2p_set_state(p2p, P2P_IDLE);
691 os_memset(dev->inv_ssid, 0, sizeof(dev->inv_ssid));
692 dev->inv_ssid_len = 0;
693 p2p->invite_peer = NULL;
694 }
695 #endif /* CONFIG_PASN */
696
697
p2p_invite_send(struct p2p_data * p2p,struct p2p_device * dev,const u8 * go_dev_addr,int dev_pw_id)698 int p2p_invite_send(struct p2p_data *p2p, struct p2p_device *dev,
699 const u8 *go_dev_addr, int dev_pw_id)
700 {
701 struct wpabuf *req;
702 int freq;
703
704 freq = dev->listen_freq > 0 ? dev->listen_freq : dev->oper_freq;
705 if (freq <= 0)
706 freq = dev->oob_go_neg_freq;
707 if (freq <= 0) {
708 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer "
709 MACSTR " to send Invitation Request",
710 MAC2STR(dev->info.p2p_device_addr));
711 return -1;
712 }
713
714 req = p2p_build_invitation_req(p2p, dev, go_dev_addr, dev_pw_id);
715 if (req == NULL)
716 return -1;
717 if (p2p->state != P2P_IDLE)
718 p2p_stop_listen_for_freq(p2p, freq);
719 p2p_dbg(p2p, "Sending Invitation Request");
720 p2p_set_state(p2p, P2P_INVITE);
721 p2p->pending_action_state = P2P_PENDING_INVITATION_REQUEST;
722 p2p->invite_peer = dev;
723 dev->invitation_reqs++;
724
725 /* In case of an active P2P GO use a shorter wait time to avoid
726 * issues if not sending out multiple consecutive Beacon frames. */
727 if (p2p_send_action(p2p, freq, dev->info.p2p_device_addr,
728 p2p->cfg->dev_addr, dev->info.p2p_device_addr,
729 wpabuf_head(req), wpabuf_len(req),
730 p2p->inv_role == P2P_INVITE_ROLE_ACTIVE_GO ?
731 150 : 500) < 0) {
732 p2p_dbg(p2p, "Failed to send Action frame");
733 /* Use P2P find to recover and retry */
734 p2p_set_timeout(p2p, 0, 0);
735 } else {
736 dev->flags |= P2P_DEV_WAIT_INV_REQ_ACK;
737 }
738
739 wpabuf_free(req);
740
741 return 0;
742 }
743
744
p2p_invitation_req_cb(struct p2p_data * p2p,int success)745 void p2p_invitation_req_cb(struct p2p_data *p2p, int success)
746 {
747 p2p_dbg(p2p, "Invitation Request TX callback: success=%d", success);
748
749 if (p2p->invite_peer == NULL) {
750 p2p_dbg(p2p, "No pending Invite");
751 return;
752 }
753
754 if (success)
755 p2p->invite_peer->flags &= ~P2P_DEV_WAIT_INV_REQ_ACK;
756
757 /*
758 * Use P2P find, if needed, to find the other device from its listen
759 * channel.
760 */
761 p2p_set_state(p2p, P2P_INVITE);
762 p2p_set_timeout(p2p, 0, success ? 500000 : 100000);
763 }
764
765
p2p_invitation_resp_cb(struct p2p_data * p2p,const u8 * peer,int success)766 void p2p_invitation_resp_cb(struct p2p_data *p2p, const u8 *peer, int success)
767 {
768 size_t pmk_len = 0;
769 const u8 *pmkid = NULL, *pmk = NULL;
770
771 #ifdef CONFIG_PASN
772 u8 _pmkid[PMKID_LEN];
773 u8 _pmk[PMK_LEN_MAX];
774 struct p2p_device *dev;
775
776 dev = p2p_get_device(p2p, peer);
777 if (dev && dev->pasn) {
778 pasn_responder_pmksa_cache_get(dev->pasn->pmksa,
779 dev->pasn->peer_addr, _pmkid,
780 _pmk, &pmk_len);
781 pmkid = _pmkid;
782 pmk = _pmk;
783 }
784 #endif /* CONFIG_PASN */
785
786 p2p_dbg(p2p, "Invitation Response TX callback: success=%d", success);
787 p2p->cfg->send_action_done(p2p->cfg->cb_ctx);
788
789 if (!success)
790 p2p_dbg(p2p, "Assume Invitation Response was actually received by the peer even though Ack was not reported");
791
792 if (p2p->cfg->invitation_received) {
793 p2p->cfg->invitation_received(p2p->cfg->cb_ctx,
794 p2p->inv_sa,
795 p2p->inv_group_bssid_ptr,
796 p2p->inv_ssid, p2p->inv_ssid_len,
797 p2p->inv_go_dev_addr,
798 p2p->inv_status,
799 p2p->inv_op_freq, pmkid, pmk,
800 pmk_len);
801 }
802
803 #ifdef CONFIG_PASN
804 /* Reset PMK and PMKID from stack */
805 forced_memzero(_pmkid, sizeof(_pmkid));
806 forced_memzero(_pmk, sizeof(_pmk));
807 #endif /* CONFIG_PASN */
808 }
809
810
p2p_invite(struct p2p_data * p2p,const u8 * peer,enum p2p_invite_role role,const u8 * bssid,const u8 * ssid,size_t ssid_len,unsigned int force_freq,const u8 * go_dev_addr,int persistent_group,unsigned int pref_freq,int dev_pw_id,bool p2p2)811 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role,
812 const u8 *bssid, const u8 *ssid, size_t ssid_len,
813 unsigned int force_freq, const u8 *go_dev_addr,
814 int persistent_group, unsigned int pref_freq, int dev_pw_id,
815 bool p2p2)
816 {
817 struct p2p_device *dev;
818
819 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d "
820 "force_freq=%u allow_6ghz=%d",
821 MAC2STR(peer), role, persistent_group, force_freq,
822 p2p->allow_6ghz);
823 if (bssid)
824 p2p_dbg(p2p, "Invitation for BSSID " MACSTR, MAC2STR(bssid));
825 if (go_dev_addr) {
826 p2p_dbg(p2p, "Invitation for GO Device Address " MACSTR,
827 MAC2STR(go_dev_addr));
828 os_memcpy(p2p->invite_go_dev_addr_buf, go_dev_addr, ETH_ALEN);
829 p2p->invite_go_dev_addr = p2p->invite_go_dev_addr_buf;
830 } else
831 p2p->invite_go_dev_addr = NULL;
832 wpa_hexdump_ascii(MSG_DEBUG, "Invitation for SSID",
833 ssid, ssid_len);
834 if (dev_pw_id >= 0) {
835 p2p_dbg(p2p, "Invitation to use Device Password ID %d",
836 dev_pw_id);
837 }
838 p2p->invite_dev_pw_id = dev_pw_id;
839 p2p->retry_invite_req = role == P2P_INVITE_ROLE_GO &&
840 persistent_group && !force_freq;
841 p2p->retry_invite_req_sent = 0;
842
843 dev = p2p_get_device(p2p, peer);
844 if (dev == NULL || (dev->listen_freq <= 0 && dev->oper_freq <= 0 &&
845 dev->oob_go_neg_freq <= 0)) {
846 p2p_dbg(p2p, "Cannot invite unknown P2P Device " MACSTR,
847 MAC2STR(peer));
848 return -1;
849 }
850
851 if (p2p_prepare_channel(p2p, dev, force_freq, pref_freq,
852 role != P2P_INVITE_ROLE_CLIENT) < 0)
853 return -1;
854
855 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq &&
856 !pref_freq)
857 dev->flags |= P2P_DEV_NO_PREF_CHAN;
858 else
859 dev->flags &= ~P2P_DEV_NO_PREF_CHAN;
860
861 if (dev->flags & P2P_DEV_GROUP_CLIENT_ONLY) {
862 if (!(dev->info.dev_capab &
863 P2P_DEV_CAPAB_CLIENT_DISCOVERABILITY)) {
864 p2p_dbg(p2p, "Cannot invite a P2P Device " MACSTR
865 " that is in a group and is not discoverable",
866 MAC2STR(peer));
867 }
868 /* TODO: use device discoverability request through GO */
869 }
870
871 dev->invitation_reqs = 0;
872
873 if (p2p->state != P2P_IDLE)
874 p2p_stop_find(p2p);
875
876 p2p->inv_role = role;
877 p2p->inv_bssid_set = bssid != NULL;
878 if (bssid)
879 os_memcpy(p2p->inv_bssid, bssid, ETH_ALEN);
880 os_memcpy(p2p->inv_ssid, ssid, ssid_len);
881 p2p->inv_ssid_len = ssid_len;
882 p2p->inv_persistent = persistent_group;
883 if (p2p2)
884 return 0;
885
886 return p2p_invite_send(p2p, dev, go_dev_addr, dev_pw_id);
887 }
888